Overview

McAfee Network Security Platform is an intelligent intrusion prevention system (IPS) solution that discovers and blocks sophisticated threats in the network. Using multiple, advanced signature-less detection techniques such as Advanced Threat Defense, real-time emulation, and endpoint integration, it moves beyond mere pattern matching to offer advanced network intrusion detection that defends against unknown stealthy attacks with extreme accuracy. The next-generation hardware platform scales to speeds of over 40 Gbps, ensuring performance is available to meet the needs of demanding networks.

With its Security Connected approach to security management, Network Security Platform organizes multiple security technologies to collectively tackle elusive and evasive attacks that are missed when only one approach is used in an intrusion detection system (IDS). This intelligent application of behavioral heuristics with real-time McAfee Global Threat Intelligence feeds accurately identifies and prevents malicious attacks for which no signature exists.

All security and management information is displayed in a correlated format that reduces the time needed and human error in detecting network intrusions. Tasks are energized when details are prioritized, so only the needed IPS/IDS data is progressively disclosed precisely when it is needed. Time saved and errors avoided drive down operation costs and free personnel to work on other projects. Network Security Platform streamlines security operations with beyond layer-7 visibility to expose hidden attack patterns for fast, accurate response to network-borne attacks.

McAfee leads in IPS security and value

Features & Benefits

Attain unparalleled network intrusion prevention

Unparalleled intrusion detection and prevention is born from identifying both the known and unknown attack. Leveraging multiple signature-less intrusion detection engines as well as ultra-efficient, vulnerability-based signature detection, this next generation network IPS appliance expertly defends against advanced malware and zero-day attacks with unprecedented accuracy. Advanced signature-less inspection of malware provides comprehensive protection from the unknown attack, while low-touch signature defenses efficiently defend against known threats, all the while keeping administration efforts and operation costs low.

Get an intelligent intrusion detection system

Reduce the expertise needed and time required to monitor and investigate security events, while simplifying the administration of large and complex deployments. Progressive disclosure delivers the right IPS/IDS information when and where you need it through guided drill downs, while hierarchal management scales for the largest deployments.

Leverage global malware protection

Get comprehensive malware coverage by intelligently directing a portfolio of antimalware defenses. Confidently reduce malware security holes, with more defenses than any other vendor, against this newest and deadliest network security attack vector.

Attain performance and scalability

Get reliable performance so the best intrusion prevention appliance is available under the heaviest loads, as the network grows, or even if segments of the network fail. Achieve high-performance, multi-gigabit throughput even when next-generation features, enabled with stateful fail-over, are available.

Gain visibility and control

Get user and device intelligence that seamlessly integrates into controls, analysis, and reporting in deep applications. This deep visibility uncovers suspicious anomalies that cannot be seen in aggregate, allowing more flexibility to align control policies to the needs of the organization.

Videos

Awards / Reviews

Leading market intelligence firm IDC provides a compelling view of the business value and benefits gained from using McAfee Network Security Platform. Derived from in-depth interviews with existing McAfee IPS customers, the report data shows how an IPS can provide cost and time savings across an organization.

Leading research firm Gartner, Inc. has placed Intel Security in the leaders quadrant in its “Magic Quadrant for Intrusion Prevention Systems”. This marks the eighth consecutive time that McAfee was named a leader in this quadrant.

NSS Labs tests the industry's leading Network Intrusion Prevention vendors on dozens of criteria and releases their finding in Product Analysis Reports. Read NSS Labs latest Security Value Map report to see how McAfee has become the leader in security and value as rated by NSS Labs.

Ranked by IT solution providers (SPs), CRN Research ranks the Top 25 must-have technology suppliers from a list of nearly 230 companies in 12 product categories that SPs need to consider when formalizing their partnerships today and for the future. 1,000 unique SPs of all types and sizes were surveyed.

Reports

This report offers forensic insight into five of the most common network attack methods that data thieves love to use. It also provides practical guidance on how criminals view your network, how to use that information to maintain a dynamic security profile, and ways to minimize the likelihood of a breach and its injurious repercussions.

This report offers insight into five of the most common network attack methods cybercriminals love to use. It provides valuable insight on how attackers target sensitive data and steal intellectual property, as well as guidance on what you can do to minimize the likelihood of a breach and its repercussions.

Leading research firm Gartner, Inc. has placed Intel Security in the leaders quadrant in its “Magic Quadrant for Intrusion Prevention Systems”. This marks the eighth consecutive time that McAfee was named a leader in this quadrant.

Signatures are great for blocking known attacks, but a comprehensive signature-less architecture is needed to block new and unknown attacks. AV-Test validated that McAfee signature-less inspection blocks 99.98% of malware without any signatures enabled. Read the report to learn how McAfee IPS has raised the bar on IPS inspection and enables security beyond the signature.

By using total cost of ownership (TCO) instead of purchase price, it is possible to factor in management of the device via labor costs associated with product installation, maintenance, upkeep, and tuning.

NSS Labs tests the industry's leading Network Intrusion Prevention vendors on dozens of criteria and releases their finding in Product Analysis Reports. In this report, the McAfee Network Security Platform M-8000 is rated on its security effectiveness, performance, management, TCO and overall value.

Solution Briefs

This brief discusses the Intel Security approach to protocol-based Intrusion Prevention System inspection and how it differs from other security vendors. Intel Security uses protocol inspection as the foundation of IPS solutions and builds advanced intelligence on top of this architecture to provide superior protection and IPS performance.

McAfee Network Security Platform combines extraordinary performance, advanced signature-less inspection, deep integration with other security systems, intelligent central management, and scalability to secure the very largest environments, making it the IPS of choice for the world’s most demanding data centers.

Many of today’s unknown, zero-day threats evade traditional signature-based defenses. The addition of third-party sandbox appliances can help, but they have several limitations: high cost of deployment, reliance on a generic virtualized environments, and limited analysis techniques, making the sandbox vulnerable to crafty malware designed to bypass analysis. McAfee Network Security Platform IPS and McAfee Advanced Threat Defense work together to find sophisticated threats, freeze them so they cannot infiltrate, and fix the damage done.

With attacks on the rise, IT budgets constrained, and experienced security personnel in short supply, businesses are looking to Managed Service Providers to help fill the gap. McAfee Network Security Platform is uniquely intelligent and purpose-built to offer unmatched protection, performance, and multitenant scale for your intrusion prevention system (IPS) services.

White Papers

This white paper discusses virtual patching and how using predictive threat coverage, automated vulnerability scanning, and risk visualization is a scalable and cost-effective approach to protecting critical assets.

In this white paper, leading market intelligence firm IDC provides a compelling view of the business value and benefits gained from using McAfee Network Security Platform. Derived from in-depth interviews with existing McAfee IPS customers, the report data shows how an IPS can provide cost and time savings across an organization.

Learn how the McAfee signature-less intrusion prevention system (IPS) technology is changing the way malware is detected and blocked. Signature-based detection provides an important foundation for intrusion inspection, but a layered signature-less architecture greatly enhances malware detection and reduces the risk. Read about the seven signature-less detection methods McAfee offers and how they are transforming IPS.

Security products with layer-7 visibility are great. But in order to dramatically improve your understanding of security events, you need to extend your vision to the specific application processes responsible for initiating a connection. It’s something we call Beyond Layer-7 Visibility.

SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.

This paper is to present the satisfied Snort user and open source security proponent with an effective way to add advanced malware detection and automated threat blocking to an existing Snort-based intrusion prevention system (IPS).

Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

This paper will walk you through the entire process — from soup to nuts — of evaluating, selecting, and deploying a SIEM. It offers pragmatic advice on how to get it done based on years working through this process as both consumers and vendors of SIEM technology. The process is not always painless, but we are certain it will help you avoid foundering on bad technology and inter-office politics. You owe it to yourself and your organization to ask the right questions and to get answers. It is time to slay the sacred cow of your substantial SIEM investment, and to figure out your best path forward.

This paper provides a detailed review of seven threats that take on unique profiles within 4G networks. It also offers a security reference architecture to efficiently counter these threats with minimal cost or service disruption.

With federal budgets trending downward and both cyberthreats and mandates heading upward, the question becomes, "Can you get comprehensive cybersecurity that provides real-time threat visibility and protection at a reasonable cost? The answer is yes."

Community

Blogs

Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Cyber-criminals are the Hyenas of the Digital Ecosystem (my sincerest apologies to hyenas). Cyber-criminals […]

Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Coffee, Cocaine, and SSL Attacks. Today’s cybercriminals have borrowed a tried and true technique […]

Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part blog series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Breaking Bad Code: Exposing the Walter White of Attack Methods The popular crime […]

Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part blog series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. No Smoke. No Mirrors. No Misdirection: Evasive Thieves Attack with Houdini-like Prowess. Cyber-thieves […]

Understanding the attack methods and techniques of bad guys provides valuable insights that can help you refine your security posture. This five-part blog series looks at attacks from a thief’s perspective and shows you how the latest security technologies can block them. Employees Are So Helpful—Just Ask any Hacker. Everyone must choose their battles. Take […]